Download Arctic Wolf IoC lists

Arctic Wolf® maintains comprehensive Indicators of Compromise (IoCs) lists based on ongoing threat intelligence research. You can use this information to augment or enhance your cybersecurity infrastructure, such as adding suspicious IP addresses to a firewall denylist or annotations for IoCs in a cybersecurity system.

These lists are available as downloadable TXT files:

  • Suspicious IP addresses
  • Suspicious domains
  • Suspicious URLs
  • Suspicious MD5 file hashes

These resources are required:

  • A Threat Intelligence Plus subscription

  1. Sign in to the Arctic Wolf Unified Portal.
  2. In the navigation menu, click Threat Intelligence > IoC Blocklists.
  3. In the Threat Intelligence Downloads section, in the Download Link column, click the link for one or more TXT files.